2020
DOI: 10.1016/j.neucom.2019.11.016
|View full text |Cite
|
Sign up to set email alerts
|

A novel statistical analysis and autoencoder driven intelligent intrusion detection approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
93
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 192 publications
(94 citation statements)
references
References 25 publications
1
93
0
Order By: Relevance
“…In what follows, the details of the resulting design are presented. [27] Difference between real and Neural networks-ARIMA Supervised predicted consumption Ieracitano et al [34] Statistical features Autoencoder base LSTM Unsupervised Ramchandran et al [36] Raw images and detected edges Convolutional DNN-based Unsupervised autoencoder and LSTM Janetzko et al [46] Power spectrum Clustering and visual analytics Unsupervised Ma el al. [47] Standard deviation of temporal FCD-POD-LSE Unsupervised coefficients Cui and Wang [48] Power consumption time series Polynomial regression and Semi-supervised Gaussian distribution Buzau et al [52] Historic and non-sequential power data DNN-based LSTM and MLP Supervised Lin and Claridge [54] Power consumption deviation between measured Unsupervised and temperature and simulated consumption Araya et al [55] Contextual/behavioral features Detecting incomplete data in Unsupervised sliding window Liu et al [56] Power and temperature Lambda architecture Supervised Current paper Micro-moment consumption and DNN and rule-based algorithm Supervised occupancy data Fig.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…In what follows, the details of the resulting design are presented. [27] Difference between real and Neural networks-ARIMA Supervised predicted consumption Ieracitano et al [34] Statistical features Autoencoder base LSTM Unsupervised Ramchandran et al [36] Raw images and detected edges Convolutional DNN-based Unsupervised autoencoder and LSTM Janetzko et al [46] Power spectrum Clustering and visual analytics Unsupervised Ma el al. [47] Standard deviation of temporal FCD-POD-LSE Unsupervised coefficients Cui and Wang [48] Power consumption time series Polynomial regression and Semi-supervised Gaussian distribution Buzau et al [52] Historic and non-sequential power data DNN-based LSTM and MLP Supervised Lin and Claridge [54] Power consumption deviation between measured Unsupervised and temperature and simulated consumption Araya et al [55] Contextual/behavioral features Detecting incomplete data in Unsupervised sliding window Liu et al [56] Power and temperature Lambda architecture Supervised Current paper Micro-moment consumption and DNN and rule-based algorithm Supervised occupancy data Fig.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…In [23], Yan proposes a deep anomaly detection to identify gas turbine combustor anomalies based on two principal stages: (i) it uses a DNN for learning characteristic representations extracted from multivariate time-series sensor records; and (ii) it deploys a one-class classification for modeling normal variables in the training feature set and helps in identifying anomalies through capturing the variables that do not fall into the normal class. In [34], a deep learning approach based on an autoencoder architecture is proposed for intrusion detection. It relies on using statistical data analysis with a deep autoencoder-based long short-term memory (LSTM) for extracting optimal, robust, and highly correlated characteristics.…”
Section: Machine Learning-based Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Kunang et al [46] proposed an automatic feature extraction technique based on autoencoder (i.e., a type of artificial neural network aimed to learn efficient data encodings, by following an unsupervised strategy) and support vector machine for the intrusion detection task. Recently, Ieracitano et al [47] combined the autoencoder technique with a statistical analysis, in order to define an intrusion detection approach.…”
Section: Related Workmentioning
confidence: 99%
“…Regarding to the importance of computer network nowadays and our ever growing dependency on them has made the security manner is so crucial and listed in the top of priorities for many domain of interests [6][7][8]. One of the major concerns that has been tackled in the information security community recently is the intrusion detection systems (IDS) [9][10][11].…”
Section: Introductionmentioning
confidence: 99%